how does aem prevents sql injection? | Adobe Higher Education
Skip to main content
Er kunnen geen reacties meer worden geplaatst op dit onderwerp.
Beste antwoord door BrianKasingli

You should be fine, using JCR_SQL2 is read only which means that you can only use the "SELECT" keyword.

5 reacties

Bhuwan_B
Community Advisor
Community Advisor
April 27, 2022
Anish-Sinha
Adobe Employee
Adobe Employee
April 27, 2022
arunpatidar
Community Advisor
Community Advisor
April 27, 2022

Please note that JCR SQL injections != RDBMS SQL injections. SQL in JCR is strictly read-only. As far as it is possible to manipulate a query the only risk is information leakage. No data can be manipulated as is the case with RDBMSes.

 

Arun Patidar
sourcedcode
Level 2
April 28, 2022

.

BrianKasingli
Community Advisor and Adobe Champion
Community Advisor and Adobe Champion
April 28, 2022

You should be fine, using JCR_SQL2 is read only which means that you can only use the "SELECT" keyword.

maryani
Level 2
March 27, 2023

Hi 

How can we prevent blind XPath injection for an AEM page??

 

Thanks

 

April 5, 2024

I have got a similar vulnerbility in our latest report. Did you find any solution for this?